Understanding the Value of MPLS Ethernet Encryption

Size: px
Start display at page:

Download "Understanding the Value of MPLS Ethernet Encryption"

Transcription

1 White Paper Understanding the Value of MPLS Ethernet Encryption By Jon Oltsik March, 2010 This ESG White Paper was commissioned by Thales e-security and is distributed under license from ESG. 2010, Enterprise Strategy Group, Inc. All Rights Reserved

2 White Paper: Understanding the Value of MPLS Ethernet Encryption 2 Contents Executive Summary... 3 MPLS for the Masses... 3 Layer 3 MPLS... 5 Layer 2 MPLS... 6 What about Security?... 6 Layer 2 MPLS VPNs: Outsourcing or Insourcing?... 7 The High-Performance Alternative... 8 Thales Provides a Leading Solution... 8 The Bigger Truth... 9 All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of the Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at (508)

3 White Paper: Understanding the Value of MPLS Ethernet Encryption 3 Executive Summary Multi Protocol Label Switching (MPLS) has been around for over a decade, so calling it new technology would be inappropriate. But MPLS continues to evolve, offering new types of carrier services and becoming the predominant wide area network (WAN) service offered by telecommunications providers. This paper examines the concerns of CIOs, CISOs, and network architects over the secure use of MPLS; looks at Layer 3 and Layer 2 services; and addresses the following questions: What is MPLS and why is it gaining popularity? What is the difference between MPLS Layer 3 and Layer 2 services? What are the strengths and weaknesses of Layer 3 and Layer 2 MPLS virtual private network (VPN) services? When is it appropriate to supplement generic/insecure MPLS with insourced cryptographic appliances? MPLS for the Masses First introduced in 1999, Multi Protocol Label Switching is one of the most successful technologies of the past ten years, yet few outside of the telecommunications community know anything about it. Just what is MPLS? The popular technology glossary site, whatis.com, defines MPLS as: Multiprotocol Label Switching (MPLS) is an Internet Engineering Task Force (IETF) standardsapproved technology for speeding up network traffic flow and making it easier to manage. MPLS involves setting up a specific path for a given sequence of packets, identified by a label put in each packet, thus saving the time needed for a router to look up the address to the next node to forward the packet. MPLS is called multiprotocol because it works with the Internet Protocol (IP), Asynchronous Transport Mode (ATM), and Frame Relay network protocols. With reference to the standard model for a network (the Open Systems Interconnection, or OSI model), MPLS allows most packets to be forwarded at the Layer 2 (switching) level rather than at the Layer 3 (routing) level. In addition to moving traffic faster overall, MPLS makes it easy to manage a network for quality of service (QoS). For these reasons, the technique is expected to be readily adopted as networks begin to carry more and different mixtures of traffic. As an analogy, think of a three lane highway with a good amount of traffic. A driver in a hurry may be forced to weave in and out of each lane depending upon the traffic patterns ahead. In this scenario, the driver would take a fairly random route that sped up and slowed down depending upon other traffic. Now, think of an ambulance or police car with its siren and lights on. According to the rules of the road, all other cars are required to move aside and give the emergency vehicle the right of way. In this analogy, the first driver represents typical routed network packets while the emergency vehicle corresponds to MPLS. Even if this first driver is quite skilled, his/her speed will always be limited by other traffic. The emergency vehicle, on the other hand, is given a high-speed path to its ultimate destination since all other vehicles have moved out of the way (see Figure 1). MPLS performs a similar service by adding a label to network packets as they enter a network. This label then maps a pre-determined routing path for the packets from source to destination, eliminating the randomness of typical network routing and establishing a tunnel or Virtual Circuit (VC) from point A to point B on the network.

4 White Paper: Understanding the Value of MPLS Ethernet Encryption 4 Figure 1. Highway Analogy Comparing Routed Packets and MPLS Source: Enterprise Strategy Group, In its early existence, MPLS was clearly in the right place at the right time. Since its inception, network traffic has skyrocketed as organizations embraced Internet communications and applications. As a result, MPLS enjoyed steady growth throughout the first decade of the 21 st century. According to multiple industry sources, roughly 80% of Global 2,000 companies have employed MPLS services as part of their WAN infrastructures. Why all the success? Users are moving to MPLS services in order to: Reduce IT capital and operating costs. As large organizations consolidate data centers, adopt virtualization technologies, and centralize applications, WAN bandwidth and equipment becomes more costly and complex. Rather than acquire networking technologies, develop technical skills, and manage the whole process, many organizations are opting for MPLS services from a variety of carriers. As ESG s research points out, cost reduction remains a major IT priority in 2010 (see Figure 2). 1 Clearly, MPLS WAN services are in line with this cost cutting priority. Address scaling needs. Large, geographically-dispersed organizations find it especially difficult to plan for the networking needs of users accessing web applications located in the corporate data center. Carrier investment in MPLS over the past decade created a network infrastructure suitable for most WAN requirements since it offers easy traffic engineering. Yes, MPLS still requires planning, vendor selection, and implementation, but this is far easier than traditional do-it-yourself network solutions. MPLS aligns with global expansion. MPLS isn t everywhere, but it is safe to say that it does extend to major business centers and developed countries. MPLS WANs are a great globalization solution: as organizations open R&D centers and sales offices around the world, new MPLS services can become a simple extension of the existing WAN infrastructure. 1 Source: ESG Research Report, 2010 IT Spending Survey, January 2010.

5 White Paper: Understanding the Value of MPLS Ethernet Encryption 5 Figure 2. Business Initiatives Impacting IT Spending Business initiatives that will have the greatest impact on your organization s IT spending decisions over the next months? (Percent of respondents, three responses accepted) Cost reduction initiatives 45% 54% Business process improvement initiatives Security/risk management initiatives Regulatory compliance Business growth via mergers, acquisitions, or organic expansion Improved business intelligence and delivery of realtime business information Green initiatives related to energy efficiency and/or reducing company-wide environmental impact Research and development innovation/improvement International expansion New collaborative tools and business processes utilizing Web 2.0 technologies such as blogs, wikis, social networking services, etc. 31% 34% 25% 29% 24% 26% 22% 18% 21% 23% 19% 18% 16% 12% 13% 9% 12% 13% 0% 10% 20% 30% 40% 50% 60% 2009 (N=492) 2010 (N=515) Source: Enterprise Strategy Group, Layer 3 MPLS When MPLS first came out, most networking professionals believed that ATM would be the dominant WAN technology of the 1990s and beyond, replacing legacy technologies like Frame Relay and private circuits. This was probably an accurate prediction except for one thing: the Internet boom. By 1995, carriers realized that their networks had to support massive amounts of IP traffic and web-based application growth. MPLS proved to be a great solution for its protocol neutrality: carriers could use MPLS to consolidate existing transport and network traffic like ATM, Frame Relay, IP, or Sonet. As the Internet grew, MPLS came along for the ride. This led early MPLS developers and telecommunications carriers to do all they could to make MPLS services IP-friendly. The result? Early MPLS services were based upon OSI Layer 3. In this type of implementation, MPLS was a perfect fit for organizations with legacy WAN infrastructures. In the 1990s, more and more WAN traffic turned from legacy protocols like DECNet and IPX to all IP. As this transition occurred, it made sense to abandon costly WAN services like ATM and Frame Relay in favor of IP. MPLS made this switch easier since it creates predictable traffic paths, measurable service level agreements

6 White Paper: Understanding the Value of MPLS Ethernet Encryption 6 (SLAs), and easy traffic engineering. Layer 3 MPLS VPNs also became a good fit for global organizations with large blocks of IP addresses, allowing them to implement overlapping VPNs with different security relationships. Layer 2 MPLS By the late 1990s, many carriers began offering yet another WAN alternative: Ethernet. Metro Ethernet was especially attractive to companies with distributed campuses in metropolitan areas because it allowed them to marry Ethernet s simplicity to the predictable performance of MPLS. Once again, developers and carriers saw an opportunity and responded with new Layer 2 MPLS offerings. As a result, Layer 2 MPLS was embraced by customers needing: Point-to-point or multipoint connectivity. MPLS provided a new WAN alternative to leased lines or basic Ethernet pipes perfect for hub-and-spoke network architectures associated with point-to-point or pointto-multipoint requirements. Using Virtual Private LAN Services (VPLS) as a way to also provide multipoint to multipoint communications over MPLS networks, they share an Ethernet broadcast domain and typically form a common architecture used in local campuses spread across a metropolitan area. Once again, MPLS also offers performance, scale, and cost advantages over homegrown alternatives. Easy deployment. Layer 2 MPLS is based upon Layer 2 Ethernet switching, so there was no need to share routing tables with carriers. This can result in much easier network deployment where Layer 2 MPLS services simply plug into a campus LAN. Multi-protocol support. Some organizations still need support for alternative network protocols. For example, a global organization may support IPv4 and IPv6 and thus require a WAN infrastructure capable of supporting both versions at once. Layer 2 MPLS fits this requirement like a glove. Tunneling IPv4 and IPv6 over a Layer 2 MPLS WAN is far easier than other types of protocol translation workarounds. Fast forward to today: MPLS has become a ubiquitous WAN service at both Layer 3 and Layer 2. Why? It is protocol neutral, offers predictable services, and is tremendously flexible. MPLS also provides cost benefits over other services: large organizations would typically pay about $40 to $50 per megabyte per month for Layer2 MPLS services as opposed to approximately $175 per megabyte per month for DS3 or Sonet. Ease of use, performance, and cost advantages are driving continued demand for Layer 2 MPLS services. The growing volume of data employed by enterprises to conduct day-today business requires a flexible, efficient, and cost-effective network transport alternative. The flexibility offered by Layer 2 MPLS services has been particularly appealing not only to enterprises, but also to U.S. federal government agencies and departments. Employing the Ethernet connection-oriented approach, Layer 2 MPLS services are facilitating the transition of existing infrastructure to fulfill the Department of Defense s net-centric vision of end-to-end network connectivity. What about Security? Common knowledge suggests that network security is an old problem that has been addressed for years. Yes, firewalls, intrusion detection systems (IDS)/ intrusion prevention systems (IPS), and VPNs are nothing new, but network security issues remain. In fact, ESG s 2010 IT Spending data indicates that mid-sized and large organizations believe that network security, closely followed by risk management and regulatory compliance, tops the list of security investments for 2010 beating out PC security, messaging security, and identity management (see Figure 3). 2 2 Ibid.

7 White Paper: Understanding the Value of MPLS Ethernet Encryption 7 Figure 3. Organizations Will Make Their Most Significant Investments in Network Security In which of the following technologies will your organization make the most significant investments over the next months? (Percent of respondents, N=264) Network security 48% Desktop/endpoint security 38% Web and messaging security 29% Information assurance 28% Identity and access management 27% Source: Enterprise Strategy Group, Can MPLS meet these network security requirements? No. Think of MPLS as a wide area analog to Virtual LANs (VLANs). A VLAN allows separate network nodes to connect as if they were in the same Ethernet broadcast domain, regardless of their physical location. VLANs do separate traffic for access control and traffic engineering, but the bits still ride the network in cleartext. The same holds true for MPLS as it separates IP packets or Ethernet frames, but does not protect information confidentiality or integrity with encryption on its own. This is a big vulnerability even across a private carrier MPLS network. Confidential data is still vulnerable to a man-in-themiddle attack or data breach that could lead to public-disclosure and high unexpected costs. To get around this limitation, most carriers offer MPLS VPNs in either Layer 3 or Layer 2 offerings. MPLS VPNs encrypt network traffic, aligning information confidentiality and integrity with traditional MPLS availability. These services are fine for plain vanilla secure connectivity, but Layer 3 MPLS VPNs can be limited by performance and latency issues since cryptographic processing overhead can impact overall throughput. This is especially problematic for organizations running latency-sensitive applications like voice, video, or bulk data transfer (i.e., backup, data replication, etc.) over the WAN applications typically associated with Layer 2 MPLS connectivity as well. What about L2 VPNs? These are becoming a popular alternative, especially for campus-based implementations since they provide line speed encryption. Given this, ESG expects L2 MPLS VPNs to gain popularity and accelerate MPLS growth over the next few years. Layer 2 MPLS VPNs: Outsourcing or Insourcing? 0% 10% 20% 30% 40% 50% 60% There is no doubt that Layer 2 MPLS VPN services are a great WAN solution for organizations with simple connectivity needs, but these services may not meet the needs of large organizations with dynamic and complex networks, especially those in regulated industries. Why? Carrier-based MPLS VPNs can: Introduce network performance bottlenecks and latency. Layer 2 encryption may be implemented within carrier switches with limited processing horsepower. As these switches reach capacity, cryptographic processing can restrain overall throughput. When remote office users complain about application performance or network jitter, it could be a result of this encryption overhead.

8 White Paper: Understanding the Value of MPLS Ethernet Encryption 8 Federal agencies need certified solutions. Defense and civilian agencies demand FIPS-140 and Common Criteria certified solutions. Carrier offerings may or may not have these certifications in place, limiting their applicability for government use. Layer 2 MPLS VPNs may not be enough. Organizations that need secure encrypted LANs or those with fixed point-to-point wireless connectivity between locations will need encryption hardware and key management systems in addition to those offered by MPLS service providers. Integration of carrier and enterprise security systems will not be possible in most cases. The High-Performance Alternative Clearly, the limitations described above will impact a good number of large organizations. There is an alternative, however: CIOs and CISOs can divide and conquer by purchasing generic Layer 2 MPLS services and then adding high-speed cryptographic appliances at network demarcation points. This may seem counterintuitive to a network outsourcing strategy. After all, isn t the whole point to off-load capital cost and operations to a third-party carrier? Absolutely, and these benefits remain. But by adding a high-speed cryptographic appliance, large organizations can improve: Performance. Cryptographic appliances can encrypt Ethernet frames at wire speed from 10/100 Mbps all the way to 10 Gbps. This is especially important for latency-sensitive applications and/or bulk data transfer. Security control. While most carrier services offer only 128-bit encryption, stand-alone appliances often support more robust cryptography, employing the Advanced Encryption Standard (AES) with up to 256-bit key length -the strongest commercially available algorithm in the market. This is especially important for defense, intelligence, and law enforcement agencies. Additionally, stand-alone encryption appliances help enforce the separation between security management and network administration. As cryptographic appliances normally have built-in key management capabilities, this allows organizations to be fully in control of key material generation and distribution, critical for the overall security of the network. Finally, cryptographic appliances may have FIPS and/or Common Criteria certifications, important independent security validations required by government buyers. Enterprise Network Support. Cryptographic appliances can fulfill Layer2 encryption needs across multiple network technologies including Metro Ethernet, fixed wireless, or basic LANs. Organizations processing sensitive data in today s distributed environments typically employ multi-technology WAN architectures and will benefit from the flexibility offered by stand-alone cryptography. The best cryptographic appliances will support technology standards like VPLS and WAN point-to-point and multipoint requirements. In essence, this can help organizations reduce costs, improve business processes, address security vulnerabilities, and meet regulatory compliance guidelines the top four 2010 business priorities uncovered by ESG s research. Thales Provides a Leading Solution While cryptographic appliances are widely available, one leading solution comes from Thales e-security, an industry leader in IT security solutions. The Thales solution is a purpose-built cryptographic appliance for Ethernet networks called the Datacryptor Ethernet Layer 2. This appliance is built for enterprise security needs by supporting AES-256 encryption, fully automated key management, and FIPS/Common Criteria certification. What sets Thales apart, however, is that it combines strong security with networking features such as 10Gbps Ethernet throughput, low network latency, flexible interfaces, and point-to-point and multipoint support. In this way, Thales provides the combination of performance, security control, and enterprise network support described above. As such, large organizations with complex Layer 2 WAN architectures and high security needs would be wise to bring Thales in to see how Datacryptor Ethernet Layer 2 aligns with their requirements.

9 The Bigger Truth White Paper: Understanding the Value of MPLS Ethernet Encryption 9 MPLS has established itself as a fantastic WAN technology by providing guaranteed network paths, global reach, and pricing flexibility. That said, it is not a panacea by any means. By itself, MPLS is not secure. Layer 3 MPLS VPNs can severely limit performance like previous IPSEC offerings. Layer 2 MPLS VPNs seem like the best fit especially for a Metro campus network but these services also have performance and security limitations. Smart CIOs, CISOs, and network architects should go into MPLS decisions with eyes wide open. It is also worthwhile to evaluate networking and security options independently rather than just relying on carrier services offerings. As described in this paper, large organizations with extensive network architectures, complex WANs, and high security needs may be best served by outsourcing connectivity while insourcing security. This can provide the right balance of performance, security control, and coverage while maintaining the benefits of outsourcing the WAN.

10 20 Asylum Street Milford, MA Tel: Fax:

The Evolution of Ethernet

The Evolution of Ethernet June 2010 White Paper The Evolution of Ethernet How Ethernet solutions, such as NTT America s VLink, can help businesses reduce private networking costs while leveraging Ethernet technology. Introduction

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Evolving Your Network with Metro Ethernet and MPLS VPNs

Evolving Your Network with Metro Ethernet and MPLS VPNs Evolving Your Network with Metro Ethernet and MPLS VPNs Change is a constant in enterprise networking and the axiom definitely holds true when considering wide-area connectivity options. Experienced IT

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

WAN and VPN Solutions:

WAN and VPN Solutions: WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization

More information

MPLS/IP VPN Services Market Update, 2014. United States

MPLS/IP VPN Services Market Update, 2014. United States MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts

More information

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,

More information

EVALUATING NETWORKING TECHNOLOGIES

EVALUATING NETWORKING TECHNOLOGIES WHITE PAPER EVALUATING NETWORKING TECHNOLOGIES CONTENTS EXECUTIVE SUMMARY 01 NETWORKS HAVE CHANGED 02 Origin of VPNS Next-generation VPNS TODAY S CHOICES 04 Layer 3 VPNS Layer 2 VPNS MAKING YOUR DECISION

More information

Terms VON. VoIP LAN WAN CODEC

Terms VON. VoIP LAN WAN CODEC VON Voice Over the Net. Voice transmitted over the Internet. That is the technical definition. Prescient Worldwide s product, called VON, means Voice Over Network as in ANY network, whether a client s

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

MPLS: Key Factors to Consider When Selecting Your MPLS Provider White paper MPLS: Key Factors to Consider When Selecting Your MPLS Provider New Edge Networks June 2008 New Edge Networks 3000 Columbia House Blvd. Vancouver, WA 98661 360-693-9009 1-866-636-EDGE www.newedgenetworks.com

More information

How To Get More Bandwidth From Your Business Network

How To Get More Bandwidth From Your Business Network Choosing Ethernet Services IS ETHERNET THE RIGHT CHOICE FOR YOUR NETWORK? Business Ethernet Including Ethernet over Copper (EoC) and Ethernet over Digital Signal Cross-connect (EoDSx) Delivers Cost- Effective,

More information

Using Carrier Ethernet to Create Cost Effective and Secure Wide Area Networks How Layer 2 Encryption Enables Better Use of Bandwidth.

Using Carrier Ethernet to Create Cost Effective and Secure Wide Area Networks How Layer 2 Encryption Enables Better Use of Bandwidth. White Paper Using Carrier Ethernet to Create Cost Effective and Secure Wide Area Networks How Layer 2 Encryption Enables Better Use of Bandwidth Sherman Schlar Schlar Consulting Group April 2010 Schlar

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Preparing Your IP network for High Definition Video Conferencing

Preparing Your IP network for High Definition Video Conferencing White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

MPLS VPN basics. E-Guide

MPLS VPN basics. E-Guide E-Guide In this eguide discover the differences between MPLS VPNs and traditional virtual private networks, as well as the advantages and disadvantages of the latest in service provider offerings. While

More information

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers

More information

The Keys for Campus Networking: Integration, Integration, and Integration

The Keys for Campus Networking: Integration, Integration, and Integration The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,

More information

Virtual Privacy vs. Real Security

Virtual Privacy vs. Real Security Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

How To Understand The Needs Of The Network

How To Understand The Needs Of The Network White Paper The Modern Network Monitoring Mandate By Bob Laliberte, Senior Analyst April 2014 This ESG White Paper was commissioned by Emulex and is distributed under license from ESG. White Paper: The

More information

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and Management SafeNet Network Encryption and Isolation Solution

More information

MPLS and IPSec A Misunderstood Relationship

MPLS and IPSec A Misunderstood Relationship # 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place

More information

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS AUDIENCE Data networks consultants, Network architects, designers and administrators/ managers, Systems Integrators (SI) and networks

More information

Blue 102. IP Service Architecture Futures. Geoff Huston May 2000

Blue 102. IP Service Architecture Futures. Geoff Huston May 2000 Blue 102 IP Service Architecture Futures Geoff Huston May 2000 Next Wave IP Services Service Requirements Connectivity service for customer-operated routers Service payload is IP packet High peak carriage

More information

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue

More information

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN Product Overview Today s networked applications such as voice and video are accelerating the need

More information

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,

More information

Understanding PBB-TE for Carrier Ethernet

Understanding PBB-TE for Carrier Ethernet Understanding PBB-TE for Carrier Ethernet Introduction Ethernet is evolving from an enterprise LAN technology to a much more robust, carrier-grade transport technology for metropolitan service networks.

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

MPLS in Private Networks Is It a Good Idea?

MPLS in Private Networks Is It a Good Idea? MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all

More information

The term Virtual Private Networks comes with a simple three-letter acronym VPN

The term Virtual Private Networks comes with a simple three-letter acronym VPN Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively

More information

The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class

The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class Executive Summary Network-based applications such as Voice over IP (VoIP), cloud, collaboration services

More information

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense CONNECT PROTECT Communication, Networking and Security Solutions for Defense Engage Communication provides Defense, Homeland Security and Intelligence Communities with innovative and cost effective solutions

More information

Mastering Network Design with MPLS

Mastering Network Design with MPLS Mastering Network Design with MPLS Overview In this paper, enterprise CIOs, IT&T professionals and network architects will learn how to improve productivity and security by designing multi-location Virtual

More information

ethernet services for multi-site connectivity security, performance, ip transparency

ethernet services for multi-site connectivity security, performance, ip transparency ethernet services for multi-site connectivity security, performance, ip transparency INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

SingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration

SingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration SingTel MPLS The Great Multi Protocol Label Switching (MPLS) Migration SingTel MPLS The Great MPLS Migration There are now a variety of alternatives when it comes to connecting multiple sites with WAN

More information

Enterprises have turned to cloud-based applications

Enterprises have turned to cloud-based applications JULY 2014 THE STATE OF Data Center Networking The Cloud Effect on Data Center Networking Enterprise IT departments are seeking highperformance connections to data centers for mission-critical, cloud-based

More information

Frame Relay vs. IP VPNs

Frame Relay vs. IP VPNs Contents: The Case for Frame Relay The Case for IP VPNs Conclusion Frame Relay vs. IP VPNs 2002 Contents: Table of Contents Introduction 2 Definition of Terms 2 Virtual Privacy and 3 the Value of Shared

More information

How to cut communications costs by replacing leased lines and VPNs with MPLS

How to cut communications costs by replacing leased lines and VPNs with MPLS in association with How to cut communications costs by replacing leased lines and VPNs with MPLS March 09 End of the line for leased lines and IPSec VPNs as MPLS comes of age Contents Executive summary

More information

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate

More information

Business Services. Is Ethernet the Right Choice for Your Network? Learn More: Call us at 877.634.2728. www.megapath.com

Business Services. Is Ethernet the Right Choice for Your Network? Learn More: Call us at 877.634.2728. www.megapath.com Business Services Is Ethernet the Right Choice for Your Network? Learn More: Call us at 877.634.2728. www.megapath.com Is Ethernet the Right Choice for Your Network? Business Ethernet including Ethernet

More information

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.

More information

Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service

Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service Solution Overview Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service What You Will Learn With the arrival of the fourth-generation (4G) or Long Term Evolution (LTE) cellular wireless

More information

Virtual Private LAN Service

Virtual Private LAN Service Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : kireeti@juniper.net Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place

More information

Managed Services: Taking Advantage of Managed Services in the High-End Enterprise

Managed Services: Taking Advantage of Managed Services in the High-End Enterprise Managed Services: Taking Advantage of Managed Services in the High-End Enterprise What You Will Learn This document explores the challenges and solutions for high-end enterprises using managed services.

More information

Secured Voice over VPN Tunnel and QoS. Feature Paper

Secured Voice over VPN Tunnel and QoS. Feature Paper Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

Virtualized Security: The Next Generation of Consolidation

Virtualized Security: The Next Generation of Consolidation Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the

More information

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs. Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service

More information

Simwood Carrier Ethernet

Simwood Carrier Ethernet Simwood Carrier Ethernet Simwood Carrier Ethernet is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use a number of technologies on top of our own

More information

White paper. Business Applications of Wide Area Ethernet

White paper. Business Applications of Wide Area Ethernet White paper Business Applications of Wide Area Ethernet 1 Introduction When enterprises use Ethernet as a wide area networking solution, they have the potential to realize significant gains in network

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

Virtual Private LAN Service (VPLS)

Virtual Private LAN Service (VPLS) Virtual Private LAN Service (VPLS) Walking through Wan history, from the early days Leased lines Customers subscribe to dedicated point-to-point links Cost prohibitive for customers Started in the 1980

More information

ROGERS DELIVERS THE SPEED, POWER AND RELIABILITY OF FIBRE RIGHT TO YOU.

ROGERS DELIVERS THE SPEED, POWER AND RELIABILITY OF FIBRE RIGHT TO YOU. ROGERS DELIVERS THE SPEED, POWER AND RELIABILITY OF FIBRE RIGHT TO YOU. ROGERS BUSINESS SOLUTIONS When you partner with Rogers Business Solutions, you benefit from on-going collaboration with our team

More information

Best practices for protecting network data

Best practices for protecting network data Best practices for protecting network data A company s value at risk The biggest risk to network security is underestimating the threat to network security. Recent security breaches have proven that much

More information

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions White Paper Getting on the Road to SDN Attacking DMZ Security Issues with Advanced Networking Solutions By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by NEC and is distributed

More information

WHATARETHEKEYBENEFITS OFMPLSTECHNOLOGY?

WHATARETHEKEYBENEFITS OFMPLSTECHNOLOGY? WHATARETHEKEYBENEFITS OFMPLSTECHNOLOGY? CHOOSINGTHERIGHTWIDEAREANETWORKSOLUTION FORYOURMULTI-LOCATIONENTERPRISE ExecutiveBrief P a g e 1 Executive Brief What are the Key Benefits of MPLS Technology? Choosing

More information

Monitoring Service Delivery in an MPLS Environment

Monitoring Service Delivery in an MPLS Environment Monitoring Service Delivery in an MPLS Environment A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee high-bandwidth capacity for the real-time applications

More information

Enterprise Business Products 2014

Enterprise Business Products 2014 Enterprise Business Products 2014 Enterprise Ethernet Services EPL (Ethernet Private Line) - provides point-to-point connectivity between two business locations with scalable bandwidth speeds via an Ethernet

More information

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies Reaching a Balance Between Communications and Security

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Preparing Your IP Network for High Definition Video Conferencing

Preparing Your IP Network for High Definition Video Conferencing WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available

More information

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN Arasan Chip Systems Inc. White Paper 10 Gigabit Ethernet: Scaling across LAN, MAN, WAN By Dennis McCarty March 2011 Overview Ethernet is one of the few protocols that has increased its bandwidth, while

More information

OPTIMIZING THE NETWORK FOR APPLICATIONS

OPTIMIZING THE NETWORK FOR APPLICATIONS OPTIMIZING THE NETWORK FOR APPLICATIONS Intelligent WAN and network optimization technology allow organizations to more effectively use enterprise networks as demands on bandwidth grow. Enterprises use

More information

Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning

Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning Converged TDM and IP- Based Broadband Solutions White Paper OnSite -10 Multi-Service over SDH Provisioning Copyright Copyright 2009, Patton Electronics Company. All rights reserved. Printed in the USA.

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R F l e x i b l e N e t w o r k - B a s e d, E n t e r p r i s e - C l a s s I P

More information

Transport for Enterprise VoIP Services

Transport for Enterprise VoIP Services Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP

More information

Ethernet is service provider terms can be delivered from speeds starting from 1mb all the way up to 1Gb+.

Ethernet is service provider terms can be delivered from speeds starting from 1mb all the way up to 1Gb+. Carrier Ethernet vs. (Standard) Ethernet The Ethernet Evolution. The Basics What is Ethernet? Ethernet (technical term is IEEE 802.3) has set the standard in how service providers connect customers to

More information

Carrier-class Ethernet: A Services Definition

Carrier-class Ethernet: A Services Definition m w w w. a for Business Opening Optical Networks fo W h i t e P a p e r Carrier-class Ethernet: A Services Definition Introduction Ethernet has become central to the data service definitions now coming

More information

High Speed Encryption Made in Germany

High Speed Encryption Made in Germany High Speed Encryption Made in Germany Today s Trends in Network Encryption 2 Today s Trends in Network Encryption Contents Background ATMedia GmbH Why Encryption? Which Encryption? How to deploy Encryption

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Bandwidth Management in MPLS Networks

Bandwidth Management in MPLS Networks School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: dragoss@eeng.dcu.ie

More information

White. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments.

White. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments. White Paper The Rise of Network Functions Virtualization Implications for I/O Strategies in Service Provider Environments By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned

More information

Choosing the Best Enterprise IP VPN or Ethernet Communication Solution for Business Collaboration

Choosing the Best Enterprise IP VPN or Ethernet Communication Solution for Business Collaboration WHITE PAPER Choosing the Best Enterprise IP VPN or Ethernet Communication Solution for Business Collaboration Sponsored by: AT&T Nav Chander June 2015 EXECUTIVE SUMMARY Today's enterprise information and

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

The Role of Carrier Ethernet in Business Applications

The Role of Carrier Ethernet in Business Applications The Role of Carrier Ethernet in Business Applications Examining the Choices for your Business Applications February 2012 Positioning Paper Page 1 of 11 Table of Contents 1 Introduction... 3 2 Characteristics

More information

Enterprise Broadband Access:

Enterprise Broadband Access: Enterprise Broadband Access: What s Your Choice? Executive Summary Today, broadband access isn t just about making a connection to the Internet; it s about running bandwidth-intensive business and multimedia

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

Using & Offering Wholesale Ethernet Network and Operational Considerations

Using & Offering Wholesale Ethernet Network and Operational Considerations White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

GR2000: a Gigabit Router for a Guaranteed Network

GR2000: a Gigabit Router for a Guaranteed Network Hitachi Review Vol. 48 (1999), No. 4 203 GR2000: a Gigabit Router for a Guaranteed Network Kazuo Sugai Yoshihito Sako Takeshi Aimoto OVERVIEW: Driven by the progress of the information society, corporate

More information

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved.

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved. Colt IP VPN Services 2010 Colt Technology Services Group Limited. All rights reserved. Agenda An introduction to IP VPN Colt IP VPN Hybrid Networking Workforce Mobility Summary 2 Drivers behind IP VPN

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER 1 ETHERNET ENCRYPTION MODES TECHNICAL-PAPER The CN series encryption platform is designed to secure information transmitted over a number of network protocols. The CN series encryptors secure Ethernet

More information

THE VX 9000: THE WORLD S FIRST SCALABLE, VIRTUALIZED WLAN CONTROLLER BRINGS A NEW LEVEL OF SCALABILITY, COST-EFFICIENCY AND RELIABILITY TO THE WLAN

THE VX 9000: THE WORLD S FIRST SCALABLE, VIRTUALIZED WLAN CONTROLLER BRINGS A NEW LEVEL OF SCALABILITY, COST-EFFICIENCY AND RELIABILITY TO THE WLAN The next logical evolution in WLAN architecture THE VX 9000: THE WORLD S FIRST SCALABLE, VIRTUALIZED WLAN CONTROLLER BRINGS A NEW LEVEL OF SCALABILITY, COST-EFFICIENCY AND RELIABILITY TO THE WLAN ZEBRA

More information

Navigating to MPLS-Enabled Networks: The Search for Security, Flexibility and Simplicity

Navigating to MPLS-Enabled Networks: The Search for Security, Flexibility and Simplicity AT&T s 4 POINTSOF CONVERGENCE Navigating to MPLS-Enabled Networks: The Search for Security, Flexibility and Simplicity AT&T s Four Points of Convergence Business leaders are quickly recognizing that a

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

IVCi s IntelliNet SM Network

IVCi s IntelliNet SM Network IVCi s IntelliNet SM Network Technical White Paper Introduction...2 Overview...2 A True ATM Solution End to End...2 The Power of a Switched Network...2 Data Throughput:...3 Improved Security:...3 Class

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

Group Encryption. The key to protecting data in motion BLACK BOX. 724-746-5500 blackbox.com

Group Encryption. The key to protecting data in motion BLACK BOX. 724-746-5500 blackbox.com The key to protecting data in motion BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Why data encryption?... 3 Types of data encryption... 4 The problem with IPsec... 5 The group

More information